2020 IEEE 19Th International Conference on Trust, Security and Privacy in Computing and Communications
Total Page:16
File Type:pdf, Size:1020Kb
2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020) Guangzhou , China 29 December 2020 - 1 January 2021 Pages 1-682 IEEE Catalog Number: CFP20TRU-POD ISBN: 978-1-6654-0393-1 1/3 Copyright © 2020 by the Institute of Electrical and Electronics Engineers, Inc. All Rights Reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy beyond the limit of U.S. copyright law for private use of patrons those articles in this volume that carry a code at the bottom of the first page, provided the per-copy fee indicated in the code is paid through Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. For other copying, reprint or republication permission, write to IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854. All rights reserved. *** This is a print representation of what appears in the IEEE Digital Library. Some format issues inherent in the e-media version may also appear in this print version. IEEE Catalog Number: CFP20TRU-POD ISBN (Print-On-Demand): 978-1-6654-0393-1 ISBN (Online): 978-1-6654-0392-4 ISSN: 2324-898X Additional Copies of This Publication Are Available From: Curran Associates, Inc 57 Morehouse Lane Red Hook, NY 12571 USA Phone: (845) 758-0400 Fax: (845) 758-2633 E-mail: [email protected] Web: www.proceedings.com 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) TrustCom 2020 Table of Contents Welcome Messages from IEEE TrustCom 2020 General Chairs xliii Welcome Messages from IEEE TrustCom 2020 Program Chairs xliv IEEE TrustCom 2020 Organizing and Program Committees xlv C4W 2020 Organizing and Program Committees lv AEIT 2020 Organizing and Program Committees lviii PASS4IoT 2020 Organizing and Program Committees lx IWCSS 2020 Organizing and Program Committees lxi BlockchainSys 2020 Organizing and Program Committees lxiv MLTrustCom 2020 Organizing and Program Committees lxvi SmartITC 2020 Organizing and Program Committees lxvii The 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2020) Session TrustCom-1 TT - Trust Track Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency 1 Xuewei Feng (National Key Laboratory of Science and Technology on Information System Security, China), Dongxia Wang (National Key Laboratory of Science and Technology on Information System Security, China), Zhechao Lin (National Key Laboratory of Science and Technology on Information System Security, China), Xiaohui Kuang (National Key Laboratory of Science and Technology on Information System Security, China), and Gang Zhao (National Key Laboratory of Science and Technology on Information System Security, China) Reversible Data Hiding Based on Improved Rhombus Predictor and Prediction Error Expansion 13 Xin Tang (University of International Relations, China), Linna Zhou (Beijing University of Posts and Telecommunications, China), Dan Liu (University of International Relations, China), Boyu Liu (University of International Relations, China), and Xinyi Lü (University of International Relations, China) v A Trust Routing Scheme Based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks 22 Dapeng Qu (Liaoning University, China), Jiankun Zhang (Liaoning University, China), Zhenhuan Hou (Liaoning University, China), Min Wang (Liaoning University, China), and Bo Dong (Liaoning University, China) SeRoT: A Secure Runtime System on Trusted Execution Environments 30 Jingbin Liu (TCA&SKLCS, Institute of Software, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), Yu Qin (TCA&SKLCS, Institute of Software, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China), and Dengguo Feng (TCA&SKLCS, Institute of Software, Chinese Academy of Sciences, China; University of Chinese Academy of Sciences, China) Robust Scheduling for Large-Scale Distributed Systems 38 Young Choon Lee (Macquarie University, Australia), Jayden King (Macquarie University, Australia), Young Ki Kim (The University of Sydney, Australia), and Seok-Hee Hong (The University of Sydney, Australia) Adaptive Random Test Case Generation Based on Multi-objective Evolutionary Search 46 Chengying Mao (Jiangxi University of Finance and Economics, China), Linlin Wen (Jiangxi University of Finance and Economics, China), and Tsong Yueh Chen (Swinburne University of Technology, Australia) Improving Efficiency of Key Enumeration Based on Side-Channel Analysis 54 Wei Yang (Nanjing University of Science and Technology, China), Anmin Fu (Nanjing University of Science & Technology, China), Hailong Zhang (State Key Laboratory of Cryptology, China), and Chanying Huang (Nanjing University of Science & Technology, China) Robust Spatial-Spread Deep Neural Image Watermarking 62 Marcin Plata (Wrocław University of Science and Technology, Poland; Vestigit, Wrocław, Poland) and Piotr Syga (Wrocław University of Science and Technology, Poland; Vestigit, Wrocław, Poland) DeM-CoD: Novel Access-Control-Based Cash on Delivery Mechanism for Decentralized Marketplace 71 Xuan Son Ha (FPT University, Vietnam), Hai Trieu Le (Can Tho University of Technology, Vietnam), Nadia Metoui (University of Amsterdam, Netherlands), and Nghia Duong-Trung (FPT University, Vietnam) Modeling and Analysis of RabbitMQ Using UPPAAL 79 Ran Li (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), Jiaqi Yin (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China), and Huibiao Zhu (Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, China) User-Controlled, Auditable, Cross-Jurisdiction Sharing of Healthcare Data Mediated by a Public Blockchain 87 Xiaohu Zhou (Birmingham City University, UK), Vitor Jesus (Birmingham City University, UK), Yonghao Wang (Birmingham City University, UK), and Mark Josephs (Birmingham City University, UK) vi A Unified Host-Based Intrusion Detection Framework using Spark in Cloud 97 Ming Liu (Shanghai Jiao Tong University, China), Zhi Xue (Shanghai Jiao Tong University, China), and Xiangjian (Sean) He (University of Technology Sydney, Australia) TA-HRT: A Temperature-Aware Scheduler for Heterogeneous Real-Time Multicore Systems 104 Yanshul Sharma (IIIT Guwahati, India), Zinea Das (IIIT Guwahati, India), Alok Das (IIIT Guwahati, India), and Sanjay Moulik (IIIT Guwahati, India) Reducing the Price of Protection: Identifying and Migrating Non-sensitive Code in TEE 112 Yin Liu (Software Innovations Lab, Virginia Tech) and Eli Tilevich (Software Innovations Lab, Virginia Tech) Fairness Testing of Machine Learning Models Using Deep Reinforcement Learning 121 Wentao Xie (University of Chinese Academy of Sciences, China) and Peng Wu (University of Chinese Academy of Sciences, China) ST - Security Track Cyclic Bayesian Attack Graphs: A Systematic Computational Approach 129 Isaac Matthews (Newcastle University, U.K.), John Mace (Newcastle University, U.K.), Sadegh Soudjani (Newcastle University, U.K.), and Aad van Moorsel (Newcastle University, U.K.) Practical Secure Two-Party EdDSA Signature Generation with Key Protection and Applications in Cryptocurrency 137 Qi Feng (Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, China), Debiao He (Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, China), Min Luo (Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan University, China), Zengxiang Li (Digital Research Institute, ENN Group, China), and Kim-Kwang Raymond Choo (University of Texas at San Antonio, China) Password Policies vs. Usability: When Do Users Go "Bananas"? 148 Roberto Dillon (James Cook University Singapore), Shailey Chawla (James Cook University Singapore), Dayana Hristova (Cognitive Science Hub, University of Vienna, Austria), Barbara Göbl (Research Group Entertainment Computing, University of Vienna, Austria), and Suzana Jovicic (University of Vienna, Austria) vii Malware Classification on Imbalanced Data through Self-Attention 154 Yu Ding (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China), ShuPeng Wang (Institute of Information Engineering, Chinese Academy of Sciences, China), Jian Xing (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China; National Computer Network Emergency Response Technical Team/Coordination Center of China Xinjiang Branch, China), XiaoYu Zhang (Institute of Information Engineering, Chinese Academy of Sciences, China), ZiSen Qi (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China), Ge Fu (National Computer Network Emergency Response Technical Team/Coordination Center of China, China), Qian Qiang (Institute of Information Engineering, Chinese Academy of Sciences; University of Chinese Academy of Sciences, China; National Computer Network Emergency Response Technical Team/Coordination Center of China, China), HaoLiang Sun (National Computer Network Emergency Response Technical Team/Coordination Center of China, China), and JianYu Zhang (Changan Communication Technology Co., LTD., China) Novel Design of Hardware Trojan: A Generic Approach for Defeating Testability Based Detection 162 Ning